RapidWareX 2.0.1 - 'WebUI' Cross-Site Request Forgery

RapidWareX v2.0.1 (WebUI) CSRF Exploit
Author: l3D
Sites: http://xraysecurity.blogspot.com, http://nullbyte.org.il
IRC: irc://irc.nix.co.il
Email: pupipup33@gmail.com
RapidWareX v2.0.1 (WebUI) is prone to a post-authentication CSRF vulnerability, which allows the attacker to have control over certain actions for the downloader such as Start/Retry, Pause, Clear All, Clear Finished, Add Links, etc. Please note that in order to carry out the attack, the victim must have RapidWareX running and logged in.
The example below clears all the downloads when the victim enters the page.
<img src="http://localhost:8080/ClearAll" />